Response to cyber attack, computer science assignment help

Response to cyber attack, computer science assignment help

Response to below post needed, needs to be a dialogue.

After watching the video I have the following thoughts on the subjects discussed:

The first speaker was asked about of his thoughts about being proactive against cyber-attacks instead of being reactive. Professor Hulnick stated that the intelligence community is anticipating how attacks might affect us, but there are not definitive answers yet. (YouTube, 2010) I feel that it may be possible to be proactive on some attacks, but it will never occur 100%. There will always be new technology and new methods of attacks that will be developed which may not allow this, and we must react to these new attacks when they occur. Albeit, the second speaker did mention research, which may allow a more proactive stance.

Dr. Popp stated he thought more research must be accomplished for analysis of fingerprints to predict attacks. But, he believed that this research should be done in an unclassified method and should include watchdog groups to ensure privacy is not being violated. (YouTube 2010) Now I really don’t know if accomplishing this in this unclassified manner is worthy. This might allow the procedures of “fingerprinting” to be fully known to the public, thus maybe making it easier for the bad guys to find ways around this.

Lastly Professor Reyzin discussed cyber weapons, and mentioned a worm that traveled around ending up in a nuclear facility. This facility did not keep its operational systems and business systems separate, thus allowing the worm to infect its safety system. He mentioned that keeping these systems separate may be a form of defense. (YouTube, 2010) However in June 2010 there was an attack called Stuxnet, which jumped this air gap and infected the operational system of Iran nuclear facilities. Granted this worm did target specific systems by using removable media and multiple zero-day vulnerabilities, along with advanced targeting techniques. (ISC2, 2011) Nonetheless it did prove that keeping systems separate was not the perfect defense.

On a different note, if you haven’t watched it and have access to it…Showtime has a documentary called Zero Days. This is a documentary about the Stuxnet virus and how it worked. Pretty interesting how it was discovered and designed.

References:

ISC2 Government Advisory Council Executive Writers Bureau. (2011, March 21). GCN. Retrieved from https://gcn.com/articles/2011/03/21/commentary-stuxnet-new-threats.aspx

YouTube. (2010, April 10). Cyber Terrorism and Warfare: The Emergent Threat. Retrieved from https://www.youtube.com/watch?v=CNE1tQoObbs

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper